Corporate Espionage and Countermeasures News
News updates and articles are presented regarding corporate espionage, eavesdropping, electronic countermeasures, and TSCM. Please subscribe for automatic updates by entering your email address in the box on the right. You can search past articles and view archives in the column on the right.
Excerpts from recent posts are shown below. Click on the title to view the entire article.
Evidence of eavesdropping may be right in front of you.
Even the best eavesdroppers may be nervous or have a lot on their minds. This could cause them to be careless when planting a bug or listening device. This would be true if they were spy-shop amateurs, disgruntled employees, or even state sponsored agents. Failure to clean up well after installing a device could be the clue that gives them away.
Espionage Research Institute International holds 2016 TSCM and Counterespionage Conference
Our blog posts have been a bit scarce recently due to a fairly busy schedule. One weekend was well spent attending the 2016 conference of Espionage Research Institute International (ERII), held in yearly in the Washington, DC area. ERII is made up of a number [...]
How well do you secure your meetings? John Kerry meets Egyptian security.
Security stopped John Kerry to ask if he was carrying a phone with camera "No camera?" as he was entering a meeting with the President of Egypt, Abdel Fattah Saeed Hussein Khalil el-Sisi. The guard appears to continue to ask the next person behind Kerry as well, just doing his job!
Eavesdropping on City Hall- Phone System Used for Wiretapping
Former Lake Station mayor had secretly recorded approximately 425,000 calls between Oct. 12, 2011, and Aug. 13, 2015, and continued the activity even after being released on bond as his federal corruption cases were pending. An audit of your phone system operations can help reveal potential misuse such as this. Almost all telecom systems in use today have features that can allow various forms of eavesdropping to take place.
Sports team finds listening device during routine TSCM bug sweep.
A sophisticated bugging device has been found in a hotel meeting room ahead of the Bledisloe Cup rugby clash between the Australian teams the All Blacks and the Wallabies, officials confirmed on Saturday.
Family feud: NY man charged with eavesdropping on his family.
Bottom line: don't spy on your family! Many people who want to play James Bond end up looking more like Inspector Clouseau. The vast supply of monitoring devices available from online spy shops tempt many to eavesdrop on their bosses, competitors, friends and families. A [...]
Spy tool maker can be sued for wiretap violations.
A federal appeals court in Ohio has revived a lawsuit against a company accused of helping a husband spy on his wife and her online friend in violation of state and federal wiretap laws. The case is one of several in recent years to highlight the increasing presence of easy-to-use electronic spy tools in domestic life and divorce proceedings, where evidence of infidelity can carry a tremendous advantage.
Is Pokémon Go poking holes in your security?
Pokémon Go players could be using corporate accounts or devices to play the game. According to cloud platform provider CloudLock, the first release of the Pokémon Go app, which launched in the United States in early July, requested full access to users’ Google accounts (which were used to register player accounts) through an OAuth connection. This permission, which most users granted without reading the registration screen or considering potential security implications, allowed the app to access to all of the information synced to a user’s account, including contact, calendar and files stored on the device.
Hidden camera found in apartment vent.
Small covert cameras are difficult to spot. Neighbors are on edge in an Indianapolis apartment complex after a couple found a hidden camera in their apartment. The couple found the camera in their bathroom vent Sunday. We are regularly called to inspect areas to help insure privacy. Not just bathrooms, but targets could include offices, conference rooms, or any place where privacy and confidentiality is desired.
History: Spy radios, hacking when it counts.
World War II can be thought of as the first electronic war. Radio technology was firmly established commercially by the late 1930s and poised to make huge contributions to the prosecution of the war on all sides. Radio was rapidly adopted into the battlefield, which led to advancements in miniaturization and ruggedization of previously bulky and fragile vacuum tube gear. Radios were soon being used for everything from coordinating battlefield units to detonating anti-aircraft artillery shells.